Abstract: 
We are conducting a small embedded power systems security exercise at Charles 
Darwin University Control Systems Test Facility (CSTF) on the Laot System 
designed for protecting critical infrastructure  (see 
https://trustworthy.systems/projects/TS/laot, 
https://eds.power.on.net/laot-pub).
The exercise will involve penetration testing with the targets being a 
generator controlled by a Comap controller and a small nuclear reactor 
simulator (see https://eds.power.on.net/little-moata/index).
These devices will for parts of the exercise be protected by the Laot system.
There will be no cost to participants. All material including reports will be 
provided to all participants at the end.

Keywords: seL4, Laot, MODBUS, Security, Protection of Critical Infrastructure, 
Hybrid Power Systems, AUUG

What: Laot is a seL4-based system for protecting critical infrastructure. 
Why:  The exercise is intended to test the system and provide a useful exercise 
for the penetration testing on industrial control systems.
When: Over the next 2-4 weeks.
How:  Send an email or ring Phil he will give you an exercise brief and 
timings. Any general enquires are also welcome via the same means.
Where: Remote for participants but the lab is in Darwin, Northern Australia. 
Local Darwin participants will be provided appropriate Darwin food and drink.
Who:  The 3 members of the Laot team are Gernot Heiser, Ben Leslie and Phil 
Maker.
What: the exercise will be conducted over a 72h period in order to document and 
describe vulnerabilities in a variety of systems. 

Please read the Laot and little moata references above and contact Phil.
In terms of background you will need to know the usual kali penetration tools 
(nmap, ...) and have an idea about either C or MODBUS. We will provide example 
code and exercise instructions.

Phil Maker 
web: https://eds.power.on.net/EDS
email: <[email protected]> 
phoneemail: <[email protected]> -- email to phone (fastest)
phone: +61 (0)447 630 229
_______________________________________________
Devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to